Software Security : Building secure software applications / Neha Kaul.
Material type:
TextPublication details: Ashland : Arcler Press, c2020.Description: xiii, 266 pages : color illustrationsContent type: - text
- computer
- online resource
- 9781774074312 (e-book)
- EBOP TK 5105.59 K38 2020
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
E-Books
|
Cavite State University - CCAT Campus | Electronic Resources | ER | EBOP TK 5105.59 K38 2020 (Browse shelf(Opens below)) | 1 copy | Available | EBOP0000002 |
Browsing Cavite State University - CCAT Campus shelves,Shelving location: ER,Collection: Electronic Resources Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
|
||
| EBOP TK 454.2 N48 2018 Network analysis and synthesis / | EBOP TK 5102.5 F68 2018 Fourier transform- signal processing / | EBOP TK 5105.5 P33 2019 Computer networks and communications / | EBOP TK 5105.59 K38 2020 Software Security : Building secure software applications / | EBOP TK 5105.59 T47 2022 Computer networks and security / | EBOP TK 5105.8857 I58 2019 Internet of things / | EBOP TK 7868.D5 F86 2022 Fundamentals of digital circuits / |
To access the E-Book : https://www.bibliotex.com/ (Log-in/Register is required).
Includes bibliographical references and index.
Chapter 1: Introduction and Evolution of Software
Chapter 2: Importance of Security in Software
Chapter 3: Risks of Software Use - Implications
Chapter 4: Adding Security practices Within The Sdlc Lifecycle
Chapter 5: Addition Security Guidelines
Chapter 6: Existing Software Security Solutions / Frameworks
Software Security: Building secure software applications discusses in detail the importance of security in software, and the vulnerability associated with the use of software. Considering the latest developments in technology, the book presents a detailed overview of guidelines and techniques to build secure software applications. It further explains the known security concerns, and how the same can be overcome. Towards the end, a chapter is dedicated to the techniques related to software testing and auditing.
EBOP00002 1
In English text.
There are no comments on this title.
